This week, MTN made its biggest play yet into the market for fibre connections to homes, but its biggest impact may well be within the home.
The mobile operator’s fibre-to-the-home subsidiary, Supersonic, launched a Fixed LTE offering on a month-to-month basis, meaning that homes in areas not yet wired for fibre can receive high-speed broadband. More important, they can get that access at rates that seem unprecedented for mobile data.
There are two differences from regular packages, however. For one thing, the SIM card that comes with the package only works in specific routers that have to remain plugged into a power supply. For another, the data allocation is split half-half between regular hours and a Night Owl timeframe: the hours between midnight and dawn.
“It just needs users to adjust their internet behaviour a little,” says Calvin Collett, MD of Supersonic. “Conducting massive mobile phone updates or downloading an entire library of Netflix content shouldn’t be prioritised during the day, but should be scheduled for Night Owl data consumption.”
The biggest benefit, aside from pricing, is that one does not have to wait for fibre to arrive in a specific area. While Supersonic’s core business is fixed-line fibre-to-the-home, it is now set to leverage its parent company’s massive mobile data network.
“MTN’s LTE network coverage sits at 95%, after billions of rand was invested in network upgrades in recent years. There is absolutely no reason why those waiting for a fibre connection shouldn’t move to Fixed LTE.”
Collett argues that consumers are far more savvy and well informed of developments in the telecoms space than observers think. They carefully investigate the products and services they choose to spend on, and are looking for the best deals available.
The result is that Supersonic has quietly built up a side business in installing what is called a Mesh Wi-Fi network, consisting of a main Wi-Fi router connected to the standardfibre or LTE or router, and a series of additional access pointscalled plumes, placed in areas of low coverage through ahome.
The plumes – small pods that plug into any power point –connect to one another to expand the network across a wide area. Where traditional WI-FI extenders lose up to half the fibre bandwidth with every extension, the plumes maintain most of the speed regardless of how far the network is extended. All the pods connected to the same router form a single network with the same network name, eliminating the complications Wi-FI extenders usually introduce.
“The traditional Wi-Fi router has replaced the dial up connection, and we’re all happy about this – the infamous dial up tone is ingrained in the brains of anyone over the age of 30,” says Collett. “Wi-Fi revolutionised our way of life as the router gave us access to the internet without directly connecting to a modem.
“We’ve moved forward, transitioning from ADSL to fibre. While fibre allows for high speed internet access, it is still connected to your Wi-Fi router. Naturally, the further you move away from the hub, the poorer your internet connection will be. Those dead spots around the house can become frustrating when your Wi-Fi signal shows 1 bar and it takes 5 minutes to load a single web page. Mesh Wi-Fi is the solution.”
Collett says he specifically researched a product that looked good, offered app-based management and required no cables. His research led him to Silicon Valley, and the result is the Supersonic Plume Mesh network system.
The drawback is that installation can be complicated for the non-technical consumer. To plug the gap, so to speak, Supersonic sends out technicians who conduct a Wi-Fi sweep of a home and advise how many Plume devices will be needed for 100% coverage. Based on this the technicians make a recommendation for an optimal “smart Wi-Fi”solution. Once installed, though, the network can be monitored and managed from a Supersonic App.
We tried it out and found it was a tale of two experiences. The initial experience was frustrating, as the pods tried to find each other. This is a necessary evil, it seems, as the Plume Mesh network optimises itself over a period of several days. That means the experience at the edge of the network can be very poor at the time of installation. After a few days, however the network was flying.
With a 100Mbps line, the experience next to the main router was around 105 Mbps, both up and down. That in itself was something of a marvel. But the biggest impact was felt at the furthest point from the router: where a Wi-Fi extender had previously delivered speeds of below 10Mbps, download speeds of 80Mbps became not only commonplace, but almost taken for granted.
One of the most useful features of the Plume Mesh is the level of monitoring offered through the Supersonic app. One can observe exactly what devices are connected to which pods – each is given a name, typically of the room, that is visible only through the app.
The biggest surprise of the plume solution is that it has not become a standard solution for Wi-Fi networks everywhere. In an era when we have become deeply dependent on a decent Wi-Fi signal, it has become a necessity rather than a luxury. As a result, home connectivity should be taken far more seriously than merely fobbing consumers off on low-performance extenders.
MTN seems to have taken this message to heart, rethinking its own approach to home usage.
“Internet access has become the third utility behind electricity and water,” says Collett. “Our goal is to ‘own the home’ but not just by connecting a bunch of devices to a central point. It’s really about how these devices can pioneer habitual change in the home that’s convenient and saves valuable time and money.”
Click here to read about SuperSonic’s pricing.
Lenovo unveils world’s smallest desktop PC
ThinkCentre M90n-1 Nano is powered by 8th generation Intel processors and SSD storage, catering to flexible working
Lenovo has introduced the world’s smallest desktop PC, the ThinkCentre M90n-1 Nano, to the South African Market. It says it is designed to support diverse workplaces with the power of a full-size desktop and the space-saving convenience of a laptop.
“The ThinkCentre M90n-1 Nano is further proof of Lenovo’s commitment to helping small businesses drive efficiency in their operations,” says Thibault Dousson, General Manager at Lenovo South Africa. “In South Africa, SMEs make up a third of the country’s GDP and play an integral part in boosting the economy and creating jobs. Lack of capital, investment, resources or support are among the major challenges faced by our country’s entrepreneurs.
“Lenovo wants to help entrepreneurs grow their businesses through giving them better access to critical tools and services, such as our financial services offering and leasing option. The ThinkCentre M90n-1 Nano is ideal for small business owners as it is reliable and powerful yet compact and easily transportable.”
Delivering powerful performance in an ultra-portable size, the ThinkCentre M90n-1 Nano is the most compact commercial desktop series in the world. Compact models are one-third the size of the ground-breaking ThinkCentre Tiny, at just 0.35L in volume.
With fully functional USB Type-C Gen2 and USB 3.1 Gen2 ports located on the front and back of the device, multiple displays, docks and other hardware options can further boost productivity. The ability to be powered using just one cable to a USB Type-C monitor makes the M90n-1 Nano ideal for a clutter-free workspace, whether it be placed behind a screen or under a desk.
The ThinkCentre M90n-1 Nano is MIL-810G SPEC tested – built to withstand extreme conditions including shocks, drops, dust and humidity. The desktop’s HW TPM 2.0 chip encrypts data to keep sensitive data secure, while its Kensington lock slot enables users to physically secure the device to an immovable object, protecting it from theft.
With its Modern Standby feature, users can receive emails, VoIP calls and instant messages while remaining in standby mode. When ready to commence work, the M90n-1 Nano resumes full functionality in under one second.
These features make the ThinkCentre M90n-1 Nano an easy fit across all office environments, or wherever space is limited, and staff are mobile. The ThinkCentre M90n-1 Nano also reduces energy consumption by as much as 30 percent annually over the ThinkCentre Tiny.
Powered by the 8th generation Intel processors and backed by SSD (solid state drive) storage, the ThinkCentre M90n-1 Nano offers diverse connectivity and multi-user options to keep users connected.
Hackers target hotels
Kaspersky’s research of the RevengeHotels campaign aimed at the hospitality sector, has confirmed over 20 hotels in Latin America, Europe and Asia have fallen victim to targeted malware attacks. Even more hotels are potentially affected across the globe. Travelers’ credit card data, which is stored in a hotel administration system, including those received from online travel agencies (OTAs), is at risk of being stolen and sold to criminals worldwide.
RevengeHotels is a campaign that includes different groups using traditional Remote Access Trojans (RATs) to infect businesses in the hospitality sector. The campaign has been active since 2015 but has gone on to increase its presence in 2019. At least two groups, RevengeHotels and ProCC, were identified to be part of the campaign, however more cybercriminal groups are potentially involved.
The main attack vector in this campaign is emails with crafted malicious Word, Excel or PDF documents attached. Some of them exploit CVE-2017-0199, loading it using VBS and PowerShell scripts and then installing customised versions of various RATs and other custom malware, such as ProCC, on the victim’s machine that could later execute commands and set up remote access to the infected systems.
Each spear-phishing email was crafted with special attention to detail and usually impersonating real people from legitimate organisations making a fake booking request for a large group of people. It is worth noting that even careful users could be tricked to open and download attachments from such emails as they include an abundance of details (for instance, copies of legal documents and reasons for booking at the hotel) and looked convincing. The only detail that would reveal the attacker would be a typosquatting domain of the organisation.
A phishing email sent to a hotel impersonating a booking request from an attorney’s office
Once infected, the computer could be accessed remotely not just by the cybercriminal group itself — evidence collected by Kaspersky researchers shows that remote access to hospitality desks and the data they contain is sold on criminal forums on a subscription basis. Malware collected data from hospitality desk clipboards, printer spoolers and captured screenshots (this function was triggered using specific words in English or Portuguese). Because hotel personnel often copied clients’ credit card data from OTA’s in order to charge them, that data could also be compromised.
Kaspersky telemetry confirmed targets in Argentina, Bolivia, Brazil, Chile, Costa Rica, France, Italy, Mexico, Portugal, Spain, Thailand and Turkey. However, based on data extracted from Bit.ly, a popular link shortening service used by the attackers to spread malicious links, Kaspersky researchers assume that users from many other countries have at least accessed the malicious link – suggesting that the number of countries with potential victims could be higher.
“As users grow wary of how protected their data truly is, cybercriminals turn to small businesses, which are often not very well protected from cyberattacks and possess a concentration of personal data. Hoteliers and other small businesses dealing with customer data need to be more cautious and apply professional security solutions to avoid data leaks that could potentially not only affect customers, but also damage hotel reputations as well,” comments Dmitry Bestuzhev, Head of Global Research and Analysis Team, LatAm.
To stay safe, travelers are recommended to:
- Use a virtual payment card for reservations made via OTAs, as these cards normally expire after a single charge
- When paying for a reservation or checking out at hotel desks, use a virtual wallet, such as Apple Pay or Google Pay, or a secondary credit card with a limited amount of debit available
Hotel owners and management are also advised to follow these steps to secure customer data:
- Conduct risk assessments of the existing network and implement regulations regarding how customers data is handled
- Use a reliable security solution with web protection and application control functionality, such as Kaspersky Endpoint Security for Business. Web protection helps to block access to phishing and malicious websites while application control (in white list mode) allows to make sure that no application except the white listed ones can run on hospitality desk computers.
- Introduce staff security awareness training to teach employees how to spot spear-phishing attempts and show the importance of remaining vigilant when working with incoming emails.
Read the full report, RevengeHotels: cybercrime targeting hotel desks worldwide, on Securelist.